The SME space is changing, and emerging leaders are utilising affordable, flexible and scalable big data and analytics tools. SMEs are confident about their ability to innovate, but much less certain about their ability to use big data and advanced analytics to do so...

For businesses large and small, relying on a cloud-based collaboration and productivity suite such as Microsoft Office 365 is becoming the norm. Enhancing productivity in your organisation is vital to get ahead in 2017 - and using Office 365 can help, if it's used right...

Google’s security team and Red Hat have found a flaw in a widespread computer code library that leaves hundreds of thousands of devices vulnerable to malware when performing domain-name lookups.

The bug was found in the GNU C Library, colloquially known as glibc, which offers developers a collection of open source code to act as the foundation of an app and can be found in many uses of Linux.

A buffer overflow bug, which causes programs to try to read and write more data than their allocated memory allows, was located in the getaddrinfo() function of glibc, which performs searches for IP addresses using domain name servers (DNS).

Google’s security team explained that when the getaddrinfo() function tries to communicate with a web domain or server controlled by a malicious party, or if the query is intercepted by a hacker, it is possible for malicious code to be inserted into vulnerable devices or cause them to crash. Versions of glibc above 2.9 are vulnerable to the bug.

“The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited with attacker-controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack,” the team said in a blog post.

The bug has since been patched by the maintainers of glibc. But given that it was introduced in 2008 and has avoided detection until now, the number of machines and devices that may have been infected by malware making use of the bug could be vast.

This is further compounded by the fact that Linux is used as the foundation operating system for many smart and Internet of Things (IoT) devices, notably routers.

These devices are not updated as often as laptops, PCs and smartphones, so the vulnerability may difficult to wipe out.

App and hardware developers could also be in for a nasty surprise as they may need to rework their apps with the patched version of the glibc code library.

The bug serves as a warning that, while open source tools offer an affordable and flexible way to build apps and embed functional operating systems into devices, they are also reliant on the community that maintains them.

Google explained that the bug was identified several years ago but appeared not to have been patched.

“To our surprise, we learned that the glibc maintainers had previously been alerted of the issue via their bug tracker in July 2015,” the security team said.